Analogue to digital conversion and source coding

Assignment Help Computer Network Security
Reference no: EM132205100

Purpose of the assessment

(Unit's Learning Outcomes covered, ULO) ULO b: Apply and evaluate the principles used in the generation, transmission and reception of digitally modulated signals.
ULO c: Report on the characteristics of sampling and analogue to digital conversion and source coding.
ULO f: Apply the techniques of, and report on, digital communication applications using Matlab and hardware devices.

Assessment - Analyzing Digital Communications Principles & Systems Both Manually and Using MATLAB/Simulink

Purpose of the assessment

(Unit's Learning Outcomes covered, ULO) ULO b: Apply and evaluate the principles used in the generation, transmission and reception of digitally modulated signals.

ULO c: Report on the characteristics of sampling and analogue to digital conversion and source coding.

ULO f: Apply the techniques of, and report on, digital communication applications using Matlab and hardware devices.

Objectives of the assignment:

This assignment seeks to fulfill the unit's learning outcomes b-e stated on Page 1 of this document and found in the unit description. The assignment

Question 1: ISI and Design of Equalizers

Combating inter-symbol interference (ISI) is one of the challenges in digital communications systems. Assume that the impulse response of the transmission medium between the transmitter and the receiver is p(t). The sampled impulse response is p[n], where n=t/T and T is the sampling period (or symbol duration). Then, ISI-free transmission require that

p(t) = δ(t) = { 1, t=0

                  { 0, otherwise   δ(t)

where is referred to as dirac impulse function. In practical, situations the transmission medium is not ISI-free. This is the reason why we need equalizing filters. Assume that the sampled impulse response of the channel is

p[n]= δ [n] - 0.2δ [n -1] + 0.5δ [n - 2]

(a) Derive the expression for the transfer function of the 3-tap linear equalizer which forces the ISI caused by this transmission medium to zero.
(b) Derive the expression for the impulse response of the 3-tap ZF-LE designed in Part (a).
(c) Verify that the ZF-LE that you have designed in Parts (a) and (b) actually mitigates the ISI in the channel.
(d) Does the ZF-LE cancel the entire ISI in the system? If not, how can you improve the ability of the ZF-LE to suppress the ISI?

Question 2: Digitization of signals

Consider the analog signal s(t ) = 5sin(500t + Π/5)+ cos(200t + Π/4) to be transferred over a digital communications system.

(a) Compute the maximum allowable sampling period that the analog-to-digital converter (ADC) must use to ensure the perfect reconstruction of the signal at the receiver.

(b) What theorem governs the choice made in part (a)?
(c) How many samples of the analog signal do we need to store in order to reproduce 10Π seconds of it (i.e., the analog signal)?
(d) Use MATLAB code to verify whether or not the samples collected can be used to uniquely reproduce the analog signal.

Question 3: Digital Baseband Data Generation and Transmission

We seek to transmit the message ME502 Unit using baseband digital M-ary PAM signaling, where M=16. As the transmission system is not ideal, we need to protect the bits using just a single-bit odd parity encoding for error detection. The process is that we convert each of the characters in the message into its equivalent 8-bit ASCII code, then partition the bitstream into log2(16)-bit segments streams (called symbols), then use each symbol to modulate a pulse to form the M-PAM signal prior to transmission.

(a) Encode the message into a series of bits using 8-bit ASCII encoding (including the odd- parity bit). Counting from the left side, the eighth bit in each character is the parity coding bit.

(b) How many bits in total are in the message?

(c) Divide the bit string into m= log2(16)-bit segments. Each of the m-bit segment is a symbol of 16-PAM. How many symbols do you get altogether?

(d) Evaluate the gross bit rate (Rb) and symbol rate (RS) of the 16-PAM system if we transmit the entire error-protected message in 8 microseconds.

(e) Determine the effective bit rate (Rb) and symbol rate (RS) of the 16-PAM system if we transmit the entire error-protected message in 8 microseconds

(f) Draw the signal constellation diagram of the M-PAM system, using d as a parameter.

Verified Expert

In this work we have designed expression for 3 tap linear equalizer for the discrete impulse response equation and analyzed whether the system has reduced inter symbol interference or not.Then wrote the matlab program to transmit and reproduce the analog signal over the digital communication medium. Finally ASCII to binary conversion is computed, for that constellation diagram is drawn.

Reference no: EM132205100

Questions Cloud

Vital to the success of every business organization : Why do you think communication is vital to the success of every business organization. Explain briefly.
Quality management will teach us the theories : 'Quality Management' will teach us the theories behind how and why organizations have to ensure their products and services remain consistent.
Consider that you are the buyer evaluating supplier : Consider that you are the buyer evaluating a supplier. Briefly explain the product and service provided.
Benefit of using models in decision making : Which of the following is not a benefit of using models in decision making? The responsibilities of the operations manager include.
Analogue to digital conversion and source coding : ME502 - Digital Communications - How many samples of the analog signal do we need to store in order to reproduce 10? seconds of it (i.e., the analog signal)
Part of your responsibilities is workers compensation : You currently work in Human Resources as the Benefits Manager and part of your responsibilities is Workers’ Compensation.
Any legitimate place in company human resource policies : Does genetic testing have any legitimate place in a company’s human resource policies today?
What your authors means by firm having market orientation : Explain what your authors means by a firm having a market orientation. Give a specific example of a firm and its product (s) that exhibit a market orientation.
Identification of the ethical issues : The analysis should include the following: Identification of the ethical issues involved (what was the alleged ethical wrong done, and why is/was it wrong?)

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Explain information security threats and vulnerabilities

Explain information security threats and vulnerabilities in plain English to small business owners who, while experts in their own business areas, have limited knowledge of computers, networks, and software

  Perform encryption and decryption

Encrypt the 4-block message face using the above block cipher in CBC mode with an IV of 6 (0110 in binary).

  Describe the environment of your forensic workstation

Describe the environment of your forensic workstation and the access to the machine. Describe the procedure that you used to download the image file to your work directory.

  Choose a recent technical article from a referred journal

please choose a recent technical article from a referred journal or conference proceedings on the topic of threats and

  Describe how hacker might go about cracking message

Describe how a hacker might go about cracking a message encrypted with each type of algorithm. Suggest a specific application for each type of algorithm where the advantages clearly outweigh the disadvantages.

  Provide a brief description of the model

Provide a brief description of the model - Provide a scenario where the model would be the optimal choice for access control, and why.

  Explain a technique used by hackers to cover their tracks

describe a technique used by hackers to cover their tracks after a network attack. this may take a little bit of

  Discuss the big issue, namely privacy vs convenience

Discuss the big issue, namely privacy vs. convenience, from the perspective of marketing. What are the benefits? What are the ethical issues?

  Advantages of area subdivision

The advantages and disadvantages of area subdivision and where it is applicable

  Assignment hi i am need your help in my assignment can you

hi i am need your help in my assignment. can you please help me. the date has already been passed i.e. 249 2014. so i

  Examine the various types of encryptions

Most Virtual Private Networks (VPNs) encrypt their traffic to make it secure. Examine the various types of encryptions and choose the one that you would recommend that your organization use. Provide a rationale for your response.

  How does defense in depth help prevent attacks?

How does defense in depth help prevent attacks?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd